default search action
ACM Transactions on Privacy and Security, Volume 24
Volume 24, Number 1, November 2020
- Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan:
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes. 1:1-1:33 - Chuadhry Mujeeb Ahmed, Aditya P. Mathur, Martín Ochoa:
NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints. 2:1-2:35 - Nikolaos Alexopoulos, Sheikh Mahbub Habib, Steffen Schulz, Max Mühlhäuser:
The Tip of the Iceberg: On the Merits of Finding Security Bugs. 3:1-3:33 - Alexandre Meylan, Mauro Cherubini, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin:
A Study on the Use of Checksums for Integrity Verification of Web Downloads. 4:1-4:36 - Benjamin Shreeve, Joseph Hallett, Matthew Edwards, Pauline Anthonysamy, Sylvain Frey, Awais Rashid:
"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making. 5:1-5:29 - Zhisheng Hu, Minghui Zhu, Peng Liu:
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP. 6:1-6:25
Volume 24, Number 2, February 2021
- Michalis Papaevripides, Elias Athanasopoulos:
Exploiting Mixed Binaries. 7:1-7:29 - Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection. 8:1-8:39 - Shameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu, Simone Silvestri, Sajal K. Das:
Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure. 9:1-9:36 - Vincenzo Arceri, Isabella Mastroeni:
Analyzing Dynamic Code: A Sound Abstract Interpreter for Evil Eval. 10:1-10:38 - Marcus Botacin, Hojjat Aghakhani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna, Daniela Oliveira, Paulo Lício de Geus, André Grégio:
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware. 11:1-11:31 - Isabel Wagner, Iryna Yevseyeva:
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. 12:1-12:35 - Charlie Jacomme, Steve Kremer:
An Extensive Formal Analysis of Multi-factor Authentication Protocols. 13:1-13:34
Volume 24, Number 3, April 2021
- Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. 14:1-14:36 - Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques. 15:1-15:37 - Musard Balliu, Massimo Merro, Michele Pasqua, Mikhail Shcherbakov:
Friendly Fire: Cross-app Interactions in IoT Platforms. 16:1-16:40 - Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. 17:1-17:37 - Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. 18:1-18:35 - René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Nick Kralevich:
The Android Platform Security Model. 19:1-19:35 - Rafael Veras, Christopher Collins, Julie Thorpe:
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords. 20:1-20:21 - Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar:
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis. 21:1-21:22 - Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Optimal Packet Camouflage Against Traffic Analysis. 22:1-22:23
Volume 24, Number 4, November 2021
- Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, Daehun Nyang:
Large-scale and Robust Code Authorship Identification with Deep Feature Learning. 23:1-23:35 - Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac:
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA. 24:1-24:28 - Aleieldin Salem, Sebastian Banescu, Alexander Pretschner:
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection. 25:1-25:35 - Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. 26:1-26:36 - Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli:
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection. 27:1-27:31 - Sana Maqsood, Sonia Chiasson:
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens. 28:1-28:37 - Sarah C. Helble, Ian D. Kretz, Peter A. Loscocco, John D. Ramsdell, Paul D. Rowe, Perry Alexander:
Flexible Mechanisms for Remote Attestation. 29:1-29:23 - Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv:
On the Security of Smartphone Unlock PINs. 30:1-30:36 - Simon Birnbach, Richard Baker, Simon Eberz, Ivan Martinovic:
#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones. 31:1-31:34
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.